• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
WANG Dan, ZHAO Wenbing, DING Zhiming. Review of Detection for Injection Vulnerability of Web Applications[J]. Journal of Beijing University of Technology, 2016, 42(12): 1822-1832. DOI: 10.11936/bjutxb2016020026
Citation: WANG Dan, ZHAO Wenbing, DING Zhiming. Review of Detection for Injection Vulnerability of Web Applications[J]. Journal of Beijing University of Technology, 2016, 42(12): 1822-1832. DOI: 10.11936/bjutxb2016020026

Review of Detection for Injection Vulnerability of Web Applications

More Information
  • Received Date: February 25, 2016
  • Available Online: May 28, 2023
  • To overcome the difficulties of prevention Web applications to be maliciously injected which are increased by all kinds of dynamic Web technologies applied, centered on SQL and XSS injection, the research progresses of Web application injection vulnerabilities detection in recent years were reviewed. Firstly, the classification and causes of the Web application injection security vulnerabilities were summarized; Then, the complexity of security vulnerabilities detection was analyzed; Thirdly, the key technologies of the existing detection approached, including analyzing and identifying the injection points, injection delectations by software analysis and testing, by symbolic execution, by taint analysis and models were elaborated; Finally, its future development direction was presented.

  • [1]
    WASSERMANN S G The essence of command injection attacks in Web applications Proceedings of Conference of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Charleston: ACM 2006 372 382

    WASSERMANN SG.The essence of command injection attacks in Web applications[C]∥Proceedings of Conference of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Charleston: ACM,2006:372-382.

    [2]
    WASSERMANN SG,SUZ.Sound and precise analysis of Web applications for injection vulnerabilities[C]∥Conference on Programming Language Design and Implementation. San Diego: ACM,2007:2-41.
    [3]
    JIAOA,NUNON,MIGUEC,et al.Vulnerability discovery with attack injection[J].IEEE Transactions on Software Engineering,2010,36(3):357-370.
    [4]
    CHENX,ZHENGZ,YUQ,et al.Web service recommendation via exploiting location and QoS information[J].Parallel & Distributed Systems IEEE Transactions on,2014,25(7):1913-1924.
    [5]
    SCHOLTE T BALZAROI D ROBERTSON W et al An empirical analysis of input validation mechanisms in Web applications and languages Proceedings of the 27th Annual ACM Symposium on Applied Computing. Trento : ACM 2012 1419 1426

    SCHOLTET,BALZAROID,ROBERTSONW,et al.An empirical analysis of input validation mechanisms in Web applications and languages[C]∥Proceedings of the 27th Annual ACM Symposium on Applied Computing. Trento : ACM,2012:1419-1426.

    [6]
    AKIROGA. Core characteristics of Web 2.0 services [EB/OL].[2016-05-12]. http: ∥www. akiroga. com/core-characteristics-of-web-20-services. html#.
    [7]
    HALFOND W ANAND S ORSO A. Precise interface identification to improve testing and analysis of Web applications Proceedings of the 18th International Symposium on Software Testing and Analysis. Chicago: ACM 2009 285 296

    HALFONDW,ANAND S ORSO A. Precise interface identification to improve testing and analysis of Web applications[C]∥Proceedings of the 18th International Symposium on Software Testing and Analysis. Chicago: ACM,2009:285-296.

    [8]
    THUMMALAPENTAS,LAKSHMI KV,SINHAS,et al.Guided test generation for Web applications[C]∥Proceedings of the International Conference on Software Engineering. San Francisco: IEEE,2013:162-171.
    [9]
    BALDUZZI M GIMENEZ C T BALZAROTTI D et al Automated discovery of parameter pollution vulnerabilities in Web applications Proceedings of Network and Distributed System Security Symposium. San Diego: ISOC 2011 1 10

    BALDUZZIM,GIMENEZ CT,BALZAROTTID,et al.Automated discovery of parameter pollution vulnerabilities in Web applications[C]∥Proceedings of Network and Distributed System Security Symposium. San Diego: ISOC,2011:1-10.

    [10]
    ZHENGQ,WUZ,CHENGX,et al.Learning to crawl deep Web[J].Information Systems,2013,38(6):801-819.
    [11]
    ARTZIS,DOLBYJ,JENSENS,et al.A framework for automated testing of JavaScript Web applications[C]∥Proceedings of International Conference on Software Engineering. Honolulu: IEEE,2011:571-580.
    [12]
    VON DEURSEN MA,LENSELINKS.Crawling Ajax-based Web applications through dynamic analysis of user interface state changes[J].ACM Transactions on the Web,2012,6(1):3.
    [13]
    PRATEEK S STEVE H PONGSIN P et al FLAX: systematic discovery of client-side validation vulnerabilities in rich Web applications 17th Annual Network and Distributed System Security Symposium. San Diego: ISOC 2010 1 17

    PRATEEKS,STEVEH,PONGSINP,et al.FLAX: systematic discovery of client-side validation vulnerabilities in rich Web applications[C]∥17th Annual Network and Distributed System Security Symposium. San Diego: ISOC,2010:1-17.

    [14]
    Open Web Application Security Project. OWASP Top10-2013[R/OL]. [2016-03-03]. Maryland: OWASP,2013.http:∥www.owasp. org. cn/owasp-project/download/OWASPTop102013V1. 2. pdf.
    [15]
    BUEHRER GT,WEIDE BW,SIVILOTTI P A G. Using parse tree validation to prevent SQL injection attacks[C]∥Proceedings of the 5th International Workshop on Software Engineering and Middleware. Lisbon: ACM,2005:106-113.
    [16]
    CIAMPAA,VISAGGIO CA,DIPENTAM.A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications[C]∥Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems. Cape Town: IEEE,2010:43-49.
    [17]
    SALAS M IP,MARTINSE.Security testing methodology for vulnerabilities detection of XSS in Web services and WS-security[J].Electronic Notes in Theoretical Computer Science,2014,302(302):133-154.
    [18]
    ISMAILO,ETOHM,KADOBAYASHIY,et al.A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability[C]∥Proceedings of the 18th International Conference on Advanced Information Networking and Applications. Fukuoka: IEEE,2004:145-151.
    [19]
    BATESD,BARTHSA,JACKSONC.Regular expression considered harmful in client-side XSS filter[C]∥Proceedings of the 19th International World Wide Web Conference. Raleigh: W3C,2010:91-100.
    [20]
    APPELT D NGUYEN C D BRIAND L C et al Automated testing for SQL injection vulnerabilities: an input mutation approach Proceedings of the 2014 International Symposium on Software Testing and Analysis. Bay Area: ACM 2014 259 269

    APPELTD,NGUYEN CD,BRIAND LC,et al.Automated testing for SQL injection vulnerabilities: an input mutation approach[C]∥Proceedings of the 2014 International Symposium on Software Testing and Analysis. Bay Area: ACM,2014:259-269.

    [21]
    JINX,HU XC,YING KL,et al.Code injection attacks on HTML5-based mobile apps: characterization, detection and mitigation[C]∥Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Scottsdale: ACM,2014:66-77.
    [22]
    HALFOND W GJ,CHOUDHARY SR,ORSOA.Penetration testing with improved input vector identification[C]∥Proceedings of the 2nd International Conference on Software Testing, Verification and Validation. Piscataway: IEEE,2009:346-355.
    [23]
    BOZDAG ME,VAN DEURSENA.Crawling Ajax by inferring user interface state changes[C]∥Proceedings of the International Conference on Web Engineering. Yorktown Heights: IEEE,2008:122-134.
    [24]
    MCALLISTER S KIRDA E KRUEGEL C Leveraging user interactions for in-depth testing of Web applications Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection. Cambridge: Springer 2008 191 210

    MCALLISTERS,KIRDAE,KRUEGELC.Leveraging user interactions for in-depth testing of Web applications[C]∥Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection. Cambridge: Springer,2008:191-210.

    [25]
    RAGHAVANS,GARCIA-MOLINAH.Crawling the hidden Web[C]∥Proceedings of the 2001 International Conference on Very Large DataBases. Roma: VLDB,2001:129-138.
    [26]
    CHEN J M WU C L An automated vulnerability scanner for injection attack based on injection point 2010 International Computer Symposium. Tainan: IEEE 2010 113 118

    CHEN JM,WU CL.An automated vulnerability scanner for injection attack based on injection point[C]∥2010 International Computer Symposium. Tainan: IEEE,2010:113-118.

    [27]
    VAN DEURSENA,MESBAHA,NEDERLOFA.Crawl-based analysis of Web applications: prospects and challenges[J].Science of Computer Programming,2015,97:173-180.
    [28]
    PARAMESHWARANI,BUDIANTOE,SHINDES,et al.Auto-patching DOM-based XSS at scale[C]∥Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. Bergamo: ACM,2015:272-283.
    [29]
    HALFOND W GJ,CHOUDHARY SR,ORSOA.Improving penetration testing through static and dynamic analysis[C]∥Proceedings of the Second IEEE International Conference on Software Testing, Verification and Validation. West Sussex: John Wiley and Sons Ltd,2011:195-214.
    [30]
    HAOJ,MENDESE.Usage-based statistical testing of Web applications[C]∥Proceedings of the International Conference on Web Engineering. Como: Springer,2006:17-24.
    [31]
    AMALFITANOD,FASOLINOA,TRAMONTANAP.Reverse engineering finite state machines from rich Internet applications[C]∥2008 15th Working Conference on Reverse Engineering. Antwerp: IEEE,2008:69-73.
    [32]
    SHAHRIAR H HADDAD H Risk assessment of code injection vulnerabilities using fuzzy logic-based system Proceedings of the 29th Annual ACM Symposium on Applied Computing. Gyeongju: ACM 2014 1164 1170

    SHAHRIARH,HADDADH.Risk assessment of code injection vulnerabilities using fuzzy logic-based system[C]∥Proceedings of the 29th Annual ACM Symposium on Applied Computing. Gyeongju: ACM,2014:1164-1170.

    [33]
    KAURN,KAURP.Mitigation of SQL injection attacks using threat modeling[J].ACM SIGSOFT Software Engineering Notes,2014,39(6):1-6.
    [34]
    VISHNU BA,JEVITHA KP.Prediction of cross-site scripting attack using machine learning algorithms[C] ∥Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing. Amritapuri: ACM,2014:1-5.
    [35]
    SHEYKHKANLOO NM.Employing neural networks for the detection of SQL injection attack[C]∥Proceedings of the 7th International Conference on Security of Information and Networks. Glasgow: ACM,2014:318.
    [36]
    SHEYKHKANLOO NM.SQL-IDS: evaluation of SQL attack detection and classification based on machine learning techniques[C]∥Proceedings of the 8th International Conference on Security of Information and Networks. Sochi: ACM,2015:258-266.
    [37]
    ALKHALAF M CHOUDHARY S R FAZZINIY M et al ViewPoints: differential string analysis for discovering client and server-side input validation inconsistencies International Symposium on Software Testing and Analysis. Minneapolis: ACM 2012 56 66

    ALKHALAFM,CHOUDHARY SR,FAZZINIYM,et al.ViewPoints: differential string analysis for discovering client and server-side input validation inconsistencies[C]∥International Symposium on Software Testing and Analysis. Minneapolis: ACM,2012:56-66.

    [38]
    ZANEROS,CRISCIONEC.Masibty: an anomaly based intrusion prevention system for Web applications[C]∥Proceedings of Black Hat Europe. Amsterdam: Black Hat Briefings,2009:1-17.
    [39]
    GUPTAS,GUPTA BB.PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP Web applications[C]∥Proceedings of the 12th ACM International Conference on Computing Frontiers. Ischia: ACM,2015:1-8.
    [40]
    LAM M S MARTIN M LIVSHITS B et al Securing Web applications with static and dynamic information flow tracking Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics Based Program Manipulation. New York: ACM 2008 3 12

    LAM MS,MARTINM,LIVSHITSB,et al.Securing Web applications with static and dynamic information flow tracking[C]∥Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics Based Program Manipulation. New York: ACM,2008:3-12.

    [41]
    NGUYEN-TUONGA,GUARNIERIS,GREENED,et al.Automatically hardening Web applications using precise tainting[C]∥Proceedings of the 20th IFIP International Information Security Conference. Chiba: Springer,2005:372-382.
    [42]
    SAXENAP,MOLNARD,LIVSHITSB.SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy Web applications[C]∥Proceedings of the 18th ACM Conference on Computer and Communications Security. Chicago: ACM,2011:601-614.
    [43]
    SHANNOND,HAJRAS,LEEA,et al.Abstracting symbolic execution with string analysis[C]∥Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques. Windsor: IEEE,2007:13-22.
    [44]
    HALFOND WG,ORSOA.AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks[C]∥International Conference on Automated Software Engineering. Long Beach: ACM,2005:174-183.
    [45]
    上海市软件评测中心有限公司. 关于Fortify [EB/OL].[2016-05-13]. http: ∥www. itesting. cn/index. php?_m=mod_article&_a=article_content&article_id=126.
    [46]
    深圳市九州安域科技有限公司. CodeSecure代码安全检测[EB/OL].[2016-05-13]. http: ∥www. mainway. net/chanpin/code_secure. html.
    [47]
    InformerTechnologies,Inc. Rational AppScan source edition[EB/OL].[2016-05-13]. http: ∥softadvice. informer. com/Rational_Appscan_Source_Edition. html.
    [48]
    JOVANOVIC N KRUEGEL C KIRDA E Pixy: a static analysis tool for detecting Web application vulnerabilities Proceedings of 2006 IEEE Symposium on Security and Privacy. Oakland: IEEE 2006 258 263

    JOVANOVICN,KRUEGELC,KIRDAE.Pixy: a static analysis tool for detecting Web application vulnerabilities[C]∥Proceedings of 2006 IEEE Symposium on Security and Privacy. Oakland: IEEE,2006:258-263.

    [49]
    BISHTP,HINRICHST,SKRUPSKYN,et al.NoTamper: automatic blackbox detection of parameter tampering opportunities in Web applications[C]∥Proceedings of the ACM Conference on Computer and Communications Security. Chicago: ACM,2010:607-618.
    [50]
    MARTIN M LAM M S Automatic generation of XSS and SQL injection attacks with goal-directed model checking Proceedings of the 17th Conference on Security Symposium. San Jose: USENIX Association 2008 31 43

    MARTINM,LAM MS.Automatic generation of XSS and SQL injection attacks with goal-directed model checking[C]∥Proceedings of the 17th Conference on Security Symposium. San Jose: USENIX Association,2008:31-43.

    [51]
    Hewlett Packard Enterprise Development LP. WebInspect 动态应用安全测试[EB/OL].[2016-05-13]. http: ∥www8. hp. com/cn/zh/software-solutions/asset/software-asset-viewer. html?asset=936485&module=1830243&docname=4AA1-5363ENW.
    [52]
    OWASP. Category: OWASP WebScarab Project[EB/OL].[2016-05-13]. https: ∥www. owasp. org/index. php/ Category: OWASP_WebScarab_Project.
    [53]
    SENK.DART: directed automated random testing[C]∥International Haifa Verification Conference on Hardware and Software: Verification and Testing. Israel: Springer-Verlag,2009:213-223.
    [54]
    CADARC,SENK.Symbolic execution for software testing: three decades later[J].ACM Communication,2013,56(2):82-90.
    [55]
    CADARC,GANESHV,PAWLOWSKI PM,et al.EXE: automatically generating inputs of death[C]∥ACM 13th Conference on Computer and Communication Security. New York: ACM,2006:322-335.
    [56]
    CADAR C DUNBAR D ENGLER D KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs 8th USENIX Symposium on Operating Systems Design and Implementation. San Diego: USENIX Association 2008 209 224

    CADARC,DUNBARD,ENGLERD.KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs[C]∥8th USENIX Symposium on Operating Systems Design and Implementation. San Diego: USENIX Association,2008:209-224.

    [57]
    ANANDS,PASAREANU CS,VISSERW.JPF-SE: a symbolic execution extension to Java pathfinder[C]∥Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer-Verlag,2007:134-138.
    [58]
    CHIPOUNOVV,KUZNETSOVV,CANDEAG.S2E: a platform for in-vivo multi-path analysis of software systems[J].ACM SIGARCH Computer Architecture News,2011,39(1):265-278.
    [59]
    黄强,曾庆凯.基于信息流策略的污点传播分析及动态验证[J].软件学报,2011,22(9):2036-2048.

    HUANGQ,ZENG QK.Taint propagation analysis and dynamic verification with information flow policy[J].Journal of Software,2011,22(9):2036-2048. (in Chinese)
    [60]
    TRIPPO,PISTOLAM,FINK SJ,et al.TAJ: effective taint analysis of Web applications[C]∥Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM,2009:87-97.
    [61]
    [62]
    NEWSOME J SONG D Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software Proceedings of the Network and Distributed System Security Symposium. San Diego: ISOC 2005 720 724

    NEWSOMEJ,SONGD.Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[C]∥Proceedings of the Network and Distributed System Security Symposium. San Diego: ISOC,2005:720-724.

    [63]
    CLAUSE J ORSO A Penumbra: automatically identifying failure-relevant inputs using dynamic tainting Proceedings of Symposium on Software Testing and Analysis. Chicago: ACM 2009 19 23

    CLAUSEJ,ORSOA.Penumbra: automatically identifying failure-relevant inputs using dynamic tainting[C]∥Proceedings of Symposium on Software Testing and Analysis. Chicago: ACM,2009:19-23.

    [64]
    ALKHALAFM,BULTANT,GALLEGOS JL.Verifying client-side input validation functions using string analysis[C]∥Proceedings of the 2012 International Conference on Software Engineering. Zürich: IEEE,2012:947-957.
    [65]
    VOGT P NENTWICH F JOVANOVICH N et al Cross-site scripting prevention with dynamic data tainting and static analysis Proceedings of Network and Distributed System Security Symposium. San Diego: ISOC 2007 28 37

    VOGTP,NENTWICHF,JOVANOVICHN,et al.Cross-site scripting prevention with dynamic data tainting and static analysis[C]∥Proceedings of Network and Distributed System Security Symposium. San Diego: ISOC,2007:28-37.

    [66]
    ARMANDOA,CARBONEO,COMPAGNAU,et al.Model-checking driven security testing of Web-based applications[C]∥Proceedings of the Third International Conference on Software Testing, Verification and Validation Workshops. Paris : IEEE,2010:361-370.
    [67]
    GORANKOV.Logic in computer science: modelling and reasoning about systems[M]∥Logic in Computer Science:Modelling and Reasoning About Systems. Cambridge: Cambridge University Press,2004:117-120.
    [68]
    缪淮扣,陈圣波,曾红卫.基于模型的Web 应用测试[J].计算机学报,2011,34(6):1012-1028.

    MIAO HK,CHEN SB,ZENG HW.Model-based testing for Web application[J].Chinese Journal of Computers,2011,34(6):1012-1028. (in Chinese)
    [69]
    XIONG PL,PEYTONL.A model-driven penetration test framework for Web applications[C]∥Proceedings of the 2010 Eighth Annual International Conference on Privacy Security and Trust. Ottawa: IEEE,2010:173-180.
    [70]
    MARBACKA,DOH,HEK,et al.Security test generation using threat trees[C]∥Proceedings of the ICSE Workshop on Automation of Software Test. Vancouver: IEEE,2009:62-69.
    [71]
    刘强,殷建平,蔡志平,等.基于不确定图的网络漏洞分析方法[J].软件学报,2011,22(6):1398-1412.

    LIUQ,YIN JP,CAI ZP,et al.Uncertain graph based method for network vulnerability analysis[J].Journal of Software,2011,22(6):1398-1412. (in Chinese)
    [72]
    BULTANT.Modeling interactions of Web software[C] ∥Proceedings of the 2nd International. Workshop on Automated Specification and Verification of Web Systems. Cyprus: IEEE,2006:45-52.
    [73]
    FELMETSGERV,CAVEDONL,KRUEGELC,et al.Toward automated detection of logic vulnerabilities in Web applications[C]∥Proceedings of the 19th USENIX Conference on Security. Washington, D C: USENIX Association,2010:143-160.
    [74]
    BENJAMINK,VON BOCHMANNG,JOURDAN GV,et al.Some modeling challenges when testing rich Internet applications for security[C]∥Proceedings of the 3rd International Conference on Software Testing, Verification and Validation Workshops. Paris: IEEE,2010:403-409.
    [75]
    JOVANOVICN,KRUEGELC,KIRDAE.Static analysis for detecting taint-style vulnerabilities in Web applications[J].Journal of Computer Security,2010,18(5):861-907.
    [76]
    HUANG JM,WANG HX,FUXMANA,et al.Toward query centric Web modeling and crawling[C]∥Proceedings of 2011 Very Large Database. Seattle: VLDB,2011:37.
  • Related Articles

    [1]WANG Dan, ZHAO Wenbing, DING Zhiming. Review of Big Data Security Critical Technologies[J]. Journal of Beijing University of Technology, 2017, 43(3): 335-349. DOI: 10.11936/bjutxb2016020025
    [2]XIANG Pan, ZHAO Yan, LIN Jiahao. Riding Comfort Analysis for Coupled Vehicle-track Systems With Uncertain Parameters[J]. Journal of Beijing University of Technology, 2016, 42(12): 1781-1786. DOI: 10.11936/bjutxb2016080037
    [3]FANG Hao-bo, CHEN Ji-min. 3D Printing Based on Digital Light Processing Technology[J]. Journal of Beijing University of Technology, 2015, 41(12): 1775-1782. DOI: 10.11936/bjutxb2015070050
    [4]SHI Zhao-yao, ZHANG Bin, LIN Jia-chun, ZHANG Hua. Half Century of Coordinate Metrology Technology——Evolution and Trends[J]. Journal of Beijing University of Technology, 2011, 37(5): 648-656.
    [5]WU Jian, LI Hai-liang, REN Yi, LIU Shi-bing. Research for 'Function Integration and Structure Micromation' of Spectrum Detection in μTAS Field Based on Laser Micro-technology[J]. Journal of Beijing University of Technology, 2010, 36(3): 425-428.
    [6]JIN Jiang. Improvement of the Comfort of Cement Concrete Pavement[J]. Journal of Beijing University of Technology, 2004, 30(1): 85-88.
    [7]HAN Jing-yun, LI Yan-sheng, CHU Guo-min, FEI Ren-yuan. Building of Ideal Dental Crowns Model Based on Reverse Engineering[J]. Journal of Beijing University of Technology, 2003, 29(2): 141-143.
    [8]HAN Jing-yun, CHU Guo-min, LI Yan-sheng, FEI Ren-yuan, LÜ Pei-jun, WANG Yong, YE Shao-you. Application of Reverse Engineering in Denture Design[J]. Journal of Beijing University of Technology, 2002, 28(4): 413-417.
    [9]Guo Hansheng. STM and STM-Based Atom Technology[J]. Journal of Beijing University of Technology, 1998, 24(3): 124-129.
    [10]Hua Younian, Zhou Hongzhi, Li Dagang. The CAT/CAD System for Advanced High Frequency Technology[J]. Journal of Beijing University of Technology, 1991, 17(3): 77-85,90.

Catalog

    Article views (117) PDF downloads (21) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return